• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

cyber security

Cyber Security Engineer Cary, NC (JOB)

September 1, 2020 by Leave a Comment

Role: Cyber Security Engineer
Duration: Full time
Location: Cary, NC

Clearance: Active Secret Clearance

The role will support proactive and iterative searches through the network to detect and isolate advance threat(s) that normally evade existing security solutions and/or automation. Will use available tools to support cyber threat hunts using both automated and manual tools and techniques to identify a compromise before it is detected.
This individual will analyze management and technical controls to ensure that specific security and compliance requirements are met through the verification of documented processes, procedures, and standards in order to validate the maintenance of secure configurations.

Qualifications/Required Skills:
· Bachelor degree or work experience supporting program operations for a government organization.
· Experience using the following is highly preferred: Tanium Software, Arc Sight, HBSS, ACASS, EMASS, FORESCOUT, or Palo-Alto.
· Experience using AESS (Army Endpoint Security Solutions) formerly HBSS (Host Based Security System) is strongly preferred.
· Excellent customer service and organization skills.
· Excellent verbal and written communication skills.
· Must be highly organized and detail oriented.
· Must be able to take initiative and work independently or as a member of a team.
· Must demonstrate proficiency in the following areas: multi-tasking, critical thinking; and the ability to work quickly, efficiently, and accurately in a dynamic and fluid environment.
· DoD 8570 CSSP Analyst1 Certification with Certified Ethical Hacker (CEH), Cisco Certified Network Associate Security (CCNA Security), or Cisco Certified Cyber Ops Associate (CCNA Cyber Ops) certification, at minimum.
· Proficient in Microsoft Office.
· Must have an active Secret Clearance.

Responsibilities and Duties:
· Interface with government customers/personnel to deliver timely and effective services.
· Management oversight of service functions and ensures that new or changed IT services and their supporting infrastructure are adequately approved, validated, and accepted by the government for successful delivery and operations.
· Ensure technical performance goals are met.
· Build and maintain strong and effective relationships with customers, program managers (PMs), functional leads, and management to secure compliance with schedules, resolve problems, and coordinate tasks.
· Attend weekly status meetings and assist to prepare reports.
· Facilitate problem resolution.
· Develop and implement plans and strategies for expanding capabilities to meet demand.
· Reviews and produces program deliverables.

If you are qualified, available, interested, planning to make a change, or know of a friend who might have the required qualifications and interest, please call me ASAP at (571) 223-5709 Ext.1046, even if we have spoken recently about a different position. If you do respond via e-mail please include a daytime phone number so I can reach you. In considering candidates, time is of the essence, so please respond ASAP. Thank you.
Regards,
Zaki Patel
Sr. Talent Acquisition Specialist
Ampcus Inc.
14900 Conference Center Dr, Suite 500,
Chantilly, VA 20151
703-647-6116 – Direct
703-637-7299 Ext 231 (V)
703-956-6996 (Fax)
Email ID: Zaki.patel@ampcus.com
www.ampcus.com

Filed Under: DIARMF Jobs, IT Security Jobs, risk jobs Tagged With: ACASS, Arc Sight, cary, cyber security, cyber security engineer, cybersecurity, emass, forescout, HBSS, HBSS (Host Based Security System), north carolina, Palo-Alto, Tanium Software

Job: ArcSight SME Apex Systems

June 26, 2020 by Leave a Comment

Job: ArcSight SME Apex Systems

An immediate need for an #arcSight SME here in #ColoradoSprings with #LockheedMartin

#ApexSystems
pfitzgerald@apexsystems.com
719-622-4070

#cybersecurity,#security, #technology

Filed Under: Risk Management For DoD IT Tagged With: ArcSight, cyber security, SIEM

Cyber Security IT jobs-Remote Work 3-15-2020 PODCAT 3

March 18, 2020 by Leave a Comment

In this podcast we talk about 3 jobs and getting remote work. To learn more about remote work, getting into cybersecurity and marketing your resume check out http://convocourses.com

http://www.nist80037rmf.com/wp-content/uploads/2020/03/cyber-security-IT-jobs-convocourses-3-15-2020-1.mp3

Podcast: Play in new window | Download

Subscribe: Apple Podcasts | Google Podcasts | Pandora | iHeartRadio | Stitcher | TuneIn | Deezer | RSS

Filed Under: cyberspace workforce, podcast Tagged With: cyber security, cybersecurity, podcast, Remote Work, telework

Information System Security Officer sunnyvale, CA

April 4, 2019 by Leave a Comment

check out my courses:
http://securitycompliance.thinkific.com

*****
the job in this video:
Job Title: Information Systems Security Officer
Location: Sunnyvale, CA
Duration: 6 Months (Possible extension)


Secret Clearance

Job Description:
Performs system and program auditing to ensure compliance to system security plan.
Conducts risk assessments and provides recommendations for secure implementation and compliance in accordance with government regulations and information assurance/cybersecurity guidelines. Creates, maintains and submits information system security documents and reports to regulatory agencies and leadership.
Assesses and mitigates system security threats/risks throughout the program life cycle; validates system security requirements definition and analysis; establishes system security documentation; assists with the implementation of security procedures; verifies information system security requirements; performs information system certification and accreditation planning, testing, assessing and liaison activities.
Familiar with information system security architectural documentation standards.
Able to apply information assurance / cyber security standards, directives, guidance and policies to an architectural/risk based framework.
Provide architectural / risk based analysis of information assurance / cyber security features and relate existing system to future needs and trends and requirements.

Skills Required
Windows client/server background. Some UNIX/LINUX technical experience, knowledge of OS security requirements and IS (Information Systems) auditing experience.
HBSS and SIPRNet experience required.

Experience Required
Previous ISSO and SIPRNet experience needed.

Education Required
Bachelor or equivalent work experience.

Please provide the following information
Rate Expectation:
Full Name:
Contact No:
Alternate contact (if any):
Email address:
Current Location:
Relocation:
Availability:
Visa status

Kindly share your detailed resume at zoeyw@etalentnetwork.com

If you are qualified and interested in making a change or know of a friend who might have the required qualifications, please call me ASAP at (703) 261-7028 Ext.267, even if we have spoken recently about a different position. If you do respond via e-mail please include a daytime phone number so I can reach you. In considering candidates, time is of the essence, so please respond ASAP. Thank you.

Sincerely yours,
ZoeyWest
E TalentNetwork

Home


8251 Greensboro Drive, Suite 250
McLeanVA
zoeyw@etalentnetwork.com
(703) 261-7028 Ext.267

Filed Under: cyberspace workforce, diarmf - implement, Information Assurance, Information Assurance Jobs, IT Security Jobs, risk jobs, Risk Management For DoD IT Tagged With: cyber, cyber security, IA, information assurance, information system security architectural, information system security officer, Information Systems Security Managers (ISSMs), ISSO, sunnyvale, threats

Security Roles and Responsibilities

July 19, 2016 by Bruce Brown Leave a Comment

There are hundreds of different roles & responsibilities in the IT Security career field alone. Here are some of the common types that I have seen:

Information System Security Manager – coordinate with the system owner and the information system security officer to ensure security is on the systems.
Information System Security Officer – coordinate with management and system administrators to implement system security controls. Ensures security controls are tracked and documented.
System Administrator – applies technical functionality and security on information systems.
Architect – assists in the design of enterprise information systems.
Security Analyst – review the logs of information systems to determine if there are any malicious activities happening.
Auditors – review the information systems to make sure the security controls are applied, documented and continuously monitored.

Filed Under: cyberspace workforce, DIARMF Jobs, risk jobs, Risk Management For DoD IT, roles Tagged With: cyber security, responsibility, rmf, roles, security

Automotive Cyber Security Onsite Lead (0302-1) in Farmington Hill, MI

March 24, 2016 by Bruce Brown Leave a Comment

Title: Automotive Cyber Security Onsite Lead (0302-1)
Location: Framington Hill, MI
Visa Status All visa are acceptable..
Duration: Long Term

Note- JD is divided into 3 classes: (a) Domain Expert (b) Product Expert (c) Testing Expert
Ideally we need to find someone who is an expert in all 3 …. but it is a challenge.
So we are good if we find one profile, who is aligned with any 2 of the 3 classes.

Job Description

Automotive Security – Domain Expert
• Cyber Security domain experience applicable to Automotive product development with over 15+ years of experience
• Solution architect involved in protocols, standards and practices applicable in Automotive Cyber Security
• Capable of mentoring team in areas of Intelligence Transport Systems standards implementation (TS102 in particular). Hold on Cyber Security guidebook J3061 (currently in WIP)
• Good hands-on knowledge on high and low potential security loopholes and related market intelligence in Automotive domain
• Effective involvement in defining and crafting best practices in Internet security for service delivery platforms (including machine to machine; server to server and server to vehicle)
• Worked on reviewing Cyber security specifications and taking these requirements through end to end implementation for an Automotive Head unit product

Automotive Security – Product Development Expert
• Cyber Security domain experience applicable to Automotive product development with over 15+ years of experience
• Experience in Communication and Network Security
• End to end involvement in bringing up security layers for embedded products using Cryptography (including Encryption identifiers)
• Contribution in areas of Authentication, Digital Signature in form of high level design, white papers, forum participations etc

Automotive Security – Testing Expert
• Cyber Security domain experience applicable to Automotive product development with over 15+ years of experience
• Hands on with Vulnerability analysis and threat modelling with the built product (preferably Infotainment head unit)
• Involved with Risk Assessment reviews
• Testing experience in form of penetration testing and fuzz testing
• Assessing the quality of the built product against Cyber Security guidelines for safety conformance
• Good hands-on knowledge on high and low potential security loopholes and related market intelligence in Automotive domain

Thanks & Regards,
John Adams
Intern Recruiter
Direct : 908-765-0002 Ext 269

Filed Under: cyberspace workforce, DIARMF Jobs, Information Assurance Jobs, risk jobs Tagged With: cyber security, testing expert

  • Go to page 1
  • Go to page 2
  • Go to Next Page »

Primary Sidebar

search

Learn to Make 6 Figures in CyberSecurity

Cyber Security How to make up to 6 Figures
6 figures in Cyber Security

This course explains how I have been able to consistently make 6 figures doing cyber security. There is a method that I have used during my development in cyber security. I am presenting that method to you.

View Course

Teleworking - IT Remote Work
Teleworking – IT Remote Work

Teleworking is something I have been doing for the last 5 years. This is how I did it.

Find Teleworking IT Jobs

View Course

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • convocourses podcast: RMF Course Updates New NIST 800-53
  • ConvoCourses podcast: get into IT from other fields
  • Convocourses Podcast: Updates, Cybersecurity Path, 8140
  • ConvoCourses Podcast: POAM-Mitigation, News, Networking RMF
  • ConvoCourses Updates Sept 2020 – discord and free stuff (PODCAST)

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert
  • Disa Help Desk | VinHomesData.com on STIG Update – DISA has released the Oracle Java Runtime Environment (JRE) 8 STIG Version 1
  • Bruce Brown on DIARMF – Continuous Monitoring
  • dpresbit on DIARMF – Continuous Monitoring

Tags

8140 8570 ArcSight c&a CISSP colorado cyber cybersecurity cyber security denver DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce HBSS IA implement implementation info assurance information assurance information security ISSO job jobs Linux mcafee nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security SIEM STIG stigs unix VMWare windows

Copyright © 2021 · Author Pro on Genesis Framework · WordPress · Log in